+ MUSE Alert

In this Issue

Table of Contents

  1. Trauma and Cure in Rebecca West’s The Return of the Soldier
  2. Steve Pinkerton
  3. pp. 1-12
  4. DOI: https://doi.org/10.2979/jml.2008.32.1.1
  5. restricted access
  1. Utopia and Apocalypse in Samuel Delany’s The Mad Man
  2. Guy Davidson
  3. pp. 13-32
  4. DOI: https://doi.org/10.2979/jml.2009.32.1.13
  5. restricted access
  1. The Truth Hurts: The Ethics of Philip Roth’s “Autobiographical” Books
  2. David Gooblar
  3. pp. 33-53
  4. DOI: https://doi.org/10.2979/jml.2008.32.1.33
  5. restricted access
  1. The Poetics of Dwelling: A Consideration of Heidegger, Kafka, and Michael K
  2. Eric Paul Meljac
  3. pp. 69-76
  4. DOI: https://doi.org/10.2979/jml.2009.32.1.69
  5. restricted access
  1. Theories of Memory: Developing a Canon
  2. Ariela Freedman
  3. pp. 77-85
  4. DOI: https://doi.org/10.2979/jml.2009.32.1.77
  5. restricted access
  1. The Banality of the Document: Charles Reznikoff’s Holocaust and Ineloquent Empathy
  2. Todd Carmody
  3. pp. 86-110
  4. DOI: https://doi.org/10.2979/jml.2008.32.1.86
  5. restricted access
  1. Gertrude Stein’s Everybody’s Autobiography and the Art of Contradictions
  2. Timothy W. Galow
  3. pp. 111-128
  4. DOI: https://doi.org/10.2979/jml.2008.32.1.111
  5. restricted access
  1. Bestial Representations of Otherness: Kafka’s Animal Stories
  2. Matthew T. Powell
  3. pp. 129-142
  4. DOI: https://doi.org/10.2979/jml.2008.32.1.129
  5. restricted access
  1. From Transmissions of Madness to Machines of Writing: Mina Loy’s Insel as Clinical Fantasy
  2. Andrew Gaedtke
  3. pp. 143-162
  4. DOI: https://doi.org/10.2979/jml.2009.32.1.143
  5. restricted access
  1. “One must have tradition in oneself, to hate it properly”: Elfriede Jelinek’s Musicality
  2. Larson Powell, Brenda Bethman
  3. pp. 163-183
  4. DOI: https://doi.org/10.2979/jml.2008.32.1.163
  5. restricted access
  1. Editor’s Introduction
  2. Robert L. Caserio
  3. pp. v-viii
  4. restricted access
  1. Notes on Contributors
  2. pp. 184-185
  3. restricted access